Active monitoring (sometimes referred to as Continuous Monitoring) is one of the most effective security controls that an organization can deploy - and can often detect a data breach before any information is lost. As the IBM i continues to evolve, so do sources of security logs. With logs being created from so many different sources, it is important to collect and monitor them in real-time to detect security events.
Download this podcast to learn about:
Current status of security logging on the IBM i
The future of log collection and monitoring
New logging sources in IBM i V7R3
Elements of an effective active monitoring strategy